Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.

Slides:



Advertisements
Similar presentations
Microsoft Forefront Client Security
Advertisements

Secure Desktop Name Title Microsoft Corporation. Agenda.
The future of Desktops Transform Your Desktop with Virtualization.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Malware Response Infrastructure Planning and Design Published: February 2011 Updated: November 2011.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Virtual techdays INDIA │ 9-11 February 2011 Cloud Services Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Aviraj.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Mark Gibson Solution Specialist Microsoft. Microsoft Trustworthy Computing Addressing Security Threats with Microsoft Next Steps.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
Virtual techdays INDIA │ 9-11 February 2011 Introduction to Windows Intune: Cloud Based Desktop Management Service Arun Subramanian │ Product Marketing.
LittleOrange Internet Security an Endpoint Security Appliance.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Norman Endpoint Protection Advanced security made easy.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Top 7 Things to Know about Activation and Genuine Software with Windows 7 For computers with perpetual licensing obtained through Microsoft volume licensing.
IT:Network:Microsoft Applications
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Srinivas L Technology Specialist – Security | Microsoft
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Small Business Edition 4 C707 – Technical overview.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Virtual techdays INDIA │ November 2010 Microsoft Anirudh Singh Rautela │ Technology Specialist - Security.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Tim Vander Kooi Systems
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Security Insights: Spyware. Spyware Challenges Bombard you with ads Change system settings Collect personal information Slow down or crash computers Invade.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Microsoft Management Seminar Series SMS 2003 Change Management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Understand Malware LESSON Security Fundamentals.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
1 Whats New in Internet Explorer 8? Ranjana Jain IT Pro Evangelist Microsoft India MCSE, MCT, RHCE, CIW Security Analyst, CISSP.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
One-of-its-Kind, SmartCOP.Easy3S is a revolutionary virus removal technology launched by one of India’s rapidly growing companies, Cyber Astro Ltd. With.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Windows Vista Configuration MCTS : Network Security.
Easy3s Smart Cop antivirus Total Security for Internet ERA.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Microsoft’s Security Strategy
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Microsoft Virtual Academy
Using Software Restriction Policies
Presentation transcript:

virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh Singh Rautela │ Security & Privacy Initiative Lead and Product Manager - Security │ Microsoft Corporation

virtual techdays INDIA │ 9-11 February 2011 Agenda This is a free flow discussion – No PPT You can ask your questions around security using the Q&A tab in the LiveMeeting console 2

Handy Admin tools & resources Threats & Counter measures Security Risk Management Guide Fundamental Computer Investigation Guide for Windows Microsoft Security Assessment Tool 4.0 MBSA Tool & Scripts Microsoft Security Compliance Manager Security Awareness Toolkit SysInternals Toolkit Security Literature to read Misc. Security Tools for Admins Just Bing it to get it!

TWC SDL Systems Management Active Directory Federation Services (ADFS) Identity & Access Management Certificate Lifecycle Management Information Protection Encrypting File System (EFS) BitLocker™ Client and Server OS Server Applications Edge Client and Server OS Server Applications Edge Forefront Protection Management A well Managed Secure Infrastructure is the key! Services Microsoft Security – Defense in Depth

Business Ready Security Help securely enable business by managing risk and empowering people As businesses look to drive growth, they need to increase collaboration, sharing and access to information but must do so while protecting their assets and infrastructure. Frequently this must be addressed in the context of shrinking budgets and increased regulatory pressure. In response to these business challenges and opportunities, Microsoft is taking a fundamentally different approach to security. We call it business ready security.

The Convergence of Desktop Security and Management Desktop management and security have traditionally existed as two separate disciplines. Yet both play a central role in keeping users safe and productive. Management ensures proper system configuration, deploys patches against vulnerabilities, and delivers necessary security updates. Security provides critical threat detection, outbreak response, and system remediation. Forefront Endpoint Protection 2010 enables businesses to align security and management to improve endpoint protection while greatly reducing operational costs. It builds on System Center Configuration Manager 2007 R2 and R3, allowing customers to use their existing client management infrastructure to deploy and manage endpoint protection. This shared infrastructure helps reduce ownership costs while providing improved visibility and control over endpoint management and security. overview.aspx 6

Safer Internet Help protect your PC with Microsoft Security Essentials Microsoft Security Essentials is a new, free consumer anti-malware solution for your computer. It helps protect against viruses, spyware, and other malicious software. It's available as a no-cost download for Windows XP SP2 and higher, Windows Vista, and Windows 7 Comprehensive protection—Microsoft Security Essentials helps defend your computer against spyware, viruses, worms, Trojans, and other malicious software. Easy to get, easy to use—Because Microsoft Security Essentials is available at no cost, there's no registration process that requires billing or personal information collection. It installs after a quick download and Genuine Windows validation and then stays automatically up-to-date with the latest protection technology and signature updates. Quiet Protection—Microsoft Security Essentials doesn't get in your way. It runs quietly in the background and schedules a scan when your computer is most likely idle. You only see alerts when you need to take action. 7

The browser people can trust! You want to browse without interruptions and with the confidence that the experience is reliable, safe and private. Windows® Internet Explorer® 9 includes built-in default settings that can help keep your computer protected from the first time you launch the browser. With SmartScreen Filter, Download reputation scanning, URL filtering, InPrivate Browsing & Filtering, XSS protection, Domain Highlighting, Tracking Protection, Java Script Sandboxing, etc., to name few, you can ensure you have a Safer Internet Experience. Read more & Download IE9 at Safer Internet -

Keep an eye on your kids The kids are online and you’re busy—Family Safety is there to help. Use activity reports to monitor your kids' computer activity. Choose websites, games, and programs they can access. Even set time periods when they can use the computer. So go ahead, be busy. Family Safety can help keep an eye on things Get Windows Live Family Safety 2011 at Safer Internet -

Stay linked to Security! Microsoft Safety & Security Center Security TechCenter - Trustworthy Computing Security and Privacy Blogs Microsoft Security Response Center Microsoft Malware Protection Center Security Research & Defense Security Development Lifecycle